Liran Tal
@lirantal.com
3.9K followers 440 following 2.4K posts
🦄 Node.js Secure Coding: http://nodejs-security.com 🌟 @GitHub Star 🏅 @OpenJS Pathfinder award for Security 🥑 DevRel at @snyksec
Posts Media Videos Starter Packs
lirantal.com
it seems timely to share my long-time comprehensive list of Node.js CLI applications best practices on GitHub: github.com/lirantal/nod...
lirantal.com
security is so simple
lirantal.com
I like how this new feature to detect pinned versions of model context protocol servers has turned out

now if you use `npx ls-mcp` then it gives you insights whether an MCP server can do a rug pull on you so you'd know if you have a security exposure to that kind of incident
lirantal.com
new summary section for the ls-mcp npx package that detects running Model Context Protocol servers across your AI agent apps, kinda slick no?
lirantal.com
oh you're using MCP but your MCP servers are using implicit "latest" versions... aha.. rug pull incoming?

the new ls-mcp feature detects if this is the case, just use it and check you're not going to crash into a security incident:

$ npx ls-mcp
Reposted by Liran Tal
kamranicus.com
Community Highlights 💖

- @lirantal.com shares supply chain security solutions with DevContainers and 1Password
- Vincent Rolfs explains why the TypeScript codebase uses var statements
- Paul points out where type safety can be an illusion
- @t3.gg reacts to the Moving Off TypeScript blog post
lirantal.com
don't expose yourself to supply chain attacks and security incidents on npm

get npq today
lirantal.com
interesting benchmark regarding code security with LLM vs SAST security tools

I'm definitely curious to re-run this myself and figure out what these "false positives" are about with Snyk but nonetheless good to see Snyk performs better than the competition
lirantal.com
if you have this MCP Server definition in your configuration file it shouldn't be a security risk because the token isn't saved in plain text

ls-mcp doesn't have a false positive detection, which is great

but in other cases, ls-mcp will warn you of credentials leak
lirantal.com
thankful to GitHub for attributing to me for finding and disclosing the path traversal vulnerability in servst npm package

servst was last published 7 years ago and has virtually 0 downloads but hey, keeping you secure is my goal and I'm not stopping!
lirantal.com
finally got GitHub to apply proper credits to my private-ip SSRF security disclosure CVE
lirantal.com
you realize the new wave of AI agents security issues and MCP servers vulnerabilities are just....... plain old SQL injection, yes?

here's why
here's more about the why: labs.snyk.io/resources/se...
lirantal.com
appreciate the shout-out Mahdy! thank you ❤️

I love educating developers about AI security and how MCP fits into mix. hope to see you again in the next Cursor user group night!
lirantal.com
Well, a tip from me: you can set user role to whatever you want, it has no evident effect on the model from a security control point of view.
lirantal.com
Thank you Kamran ❤️
lirantal.com
Will you be satisfied if I change "system" user role with "user" ?
lirantal.com
I like those points, Mike, thanks! basically what you should be paying attention to is that message is user input variable that goes into an LLM, then that LLM response is directly used to send the HTTP response to the browser so -> XSS in this simple example
lirantal.com
do you see the LLM centric security vulnerability here or should I point it out?

more context: labs.snyk.io/resources/se...
lirantal.com
Thank you! this was a nice new find for me too across a bunch of MCP servers :-)